When using macOS Mojave with BlackFog it is important to allow "Full Disk Access" to the application in order for it to correctly detect and remove malware. To do this it is necessary to open the "Security and Privacy" System Preferences. Once opened, scroll down to Full Disk Access and click the + button [...]
BlackFog Privacy Release Notes for iOS
When running software update from the Help menu the system returns with a message saying that the software signatures don't match. This error can happen if you are using versions of BlackFog prior to 3.5.1 which introduced a certificate change to the main application to support Microsofts new signing policies. The solution is to [...]
With the recent revelation that Facebook tracks you whether or not you are a Facebook customer means that people had no option to opt out of this massive data collection exercise.
It is important that PowerShell scripts designed to run at startup use the correct techniques so they are not detected as possible threats which use deceptive commands to bypass system security.
Fileless network protection is a key element to device security and is an important part of a layered approach to security. The days of protecting yourself from bad actors using AntiVirus (AV) solutions are behind us.
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency.
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.
The EU General Data Protection Regulation (GDPR) is a significant piece of European legislation which will come into force on May 25, 2018. It builds on existing data protection laws, strengthening the rights that EU individuals have over their personal data, and creating a single data protection approach across Europe.
BlackFog consists of multiple layers of protection to combat the increasing sophistication of cyber attacks. Using BlackFog's unique outbound network defense strategy it is possible to target the attack and multiple points.